| 2025 | Advance Fake Video Detection via Vision Transformers. Joy Battocchio, Stefano Dell'Anna, Andrea Montibeller, Giulia Boato |
| 2025 | Analysis and Detection of Android Stegomalware: the Impact of the Loading Stage. Diego Soi, Silvia Lucia Sanna, Giacomo Benedetti, Angelica Liguori, Leonardo Regano, Luca Caviglione, Giorgio Giacinto |
| 2025 | Can GPT tell us why these images are synthesized? Empowering Multimodal Large Language Models for Forensics. Yiran He, Yun Cao, Bowen Yang, Zeyu Zhang |
| 2025 | Clustering-Driven Pseudo-Labeling in Source-Free Domain Adaptation for Linguistic Steganalysis. Yufei Luo, Zhen Yang, Xin Xu, Yelei Wang, Ru Zhang, Yongfeng Huang |
| 2025 | Color Image Steganography Using Generative Adversarial Networks with a Phased Training Strategy. Saixing Zhou, Miaoxin Ye, Weiqi Luo, Xin Liao, Kangkang Wei |
| 2025 | Detecting and Attributing Tor-Obfuscated Malware Communications Through Traffic Fingerprinting. Pascal Tippe, Adrian Tippe, Jörg Keller |
| 2025 | Effect of Acquisition Noise Outliers on Steganalysis. Edgar Kaziakhmedov, Jessica J. Fridrich, Patrick Bas |
| 2025 | Exploring Adversarial Attacks on the MaSTer Truncation Protocol. Martin Zbudila, Aysajan Abidin, Bart Preneel |
| 2025 | How (Not) to Build Dual-Regev Covert Channel. Hoover H. F. Yin, Harry W. H. Wong |
| 2025 | Implications of Neural Compression to Scientific Images. João Phillipe Cardenuto, Joshua Krinsky, Lucas Nogueira, Aparna Bharati, Daniel Moreira |
| 2025 | MOCHA: Mixnet Optimization Considering Honest Client Anonymity. Mahdi Rahimi |
| 2025 | Modality-Agnostic Deepfakes Detection. Yu Cai, Peng Chen, Jiahe Tian, Jin Liu, Jiao Dai, Xi Wang, Shan Jia, Siwei Lyu, Jizhong Han |
| 2025 | Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSEC 2025, San Jose, USA, June 18-20, 2025 Shruti Agarwal, Scott Craver, Shan Jia, Chau-Wai Wong, Benedetta Tondi |
| 2025 | Reinforcement Learning-based Copyright Protection Watermarking for Large Language Model. Shengnan Guo, Kaiyi Pang, Zhongliang Yang, Yamin Li, Yu Qing, Yongfeng Huang |
| 2025 | Robust Multilingual Audio Deepfake Detection Through Hybrid Modeling. Candy Olivia Mawalim, Yutong Wang, Aulia Adila, Shogo Okada, Masashi Unoki |
| 2025 | SAFE: Synthetic Audio Forensics Evaluation Challenge. Kirill Trapeznikov, Paul Cummer, Pranay Pherwani, Jai Aslam, Michael Davinroy, Peter Bautista, Laura Cassani, Matthew C. Stamm |
| 2025 | Secure Payload Scaling in Detector-Informed Batch Steganography: The Mismatched Detectors Case. Eli Dworetzky, Jessica J. Fridrich |
| 2025 | Support of Forensic Attribution by Visualizing Textual Embeddings of Stegomalware. Felix Feist, Sebastian Karius, Mandy Knöchel, Sandro Wefel |
| 2025 | Towards Modeling Hidden & Steganographic Malware Communication based on Images. Claus Vielhauer, Fabian Loewe, Michael Pilgermann |
| 2025 | Traces Left by the Originator: Forensic Fingerprinting Hidden Malware in Images to Enable Attribution on the Example of SteganoAmor. Jana Dittmann, Stefan Kiltz, Robert Altschaffel, Judith Antal |
| 2025 | Triple-Stage Robust Audio Steganography Framework with AAC Encoding for Lossy Social Media Channels. Ziping Zhang, Jiamin Zeng, Yan Xu, Xiaowei Yi, Yun Cao, Changjun Liu |